Sitemap
Home
Product
Use Cases
Resources
- Blog
- Grubhub Data Breach: A Costly Meal for Customers, Drivers, and Merchants
- APIs in Healthcare: Transforming Data Sharing, Security, & Compliance
- Meet Vorlon at ViVE 2025: Addressing Third-Party Risks in Healthcare IT
- The Postman Data Leak - Exposing the Hidden Risks of API Development
- Otelier Breach: When Hotel Management Checks Out
- Snowflake Breach Response Playbook
- The Stiiizy Data Breach: Lessons for Mitigating Third-Party Security Risks
- BeyondTrust Breach: Implications for U.S. Treasury and beyond
- Vorlon’s Perspective on the Gartner Report: Adapt Your Third-Party API Security to 3 Specific Use Cases
- Better Together For All Parties: Salt Security and Vorlon
- The API Security Checklist: What to Review Before Integrating a Third-Party API
- Internal vs. Third-Party APIs: Who Would Win in a Fight!?
- Mean Time To What!?
- Capgemini's Data Disaster: When Hackers Turned Consulting into Chaos
- Fortinet Hit by Cyber Attack: Third-Party Breach Affects Asia-Pacific Customers
- Avis Car Rental Breach: Looks Like Cars Weren't the Only Thing Avis Was Giving Away
- Better Together: Vorlon + Tines
- Securing More with Less: Navigating Cybersecurity in a Shrinking Budget Era
- Dick's Sporting Goods Breach - And How Vorlon Can Help
- Put the Car in Gear and Shift Correctly: Highlights From SANS DFIR Summit
- HealthEquity Breach - And How Vorlon Can Help
- NYTimes Github Breach - And How Vorlon Can Help
- CDK Global's Breach - And How Vorlon Can Help
- Under the Hood: Examining Toyota’s Recent Data Breach
- Vorlon v2.0 Summary and Highlights
- Behind the Microphone: Insights from Our CISO Series Podcast Episode
- From Functionality to Fortification: Securing Third-Party Integrations with Vorlon
- Bitbucket Springs a (Secrets) Leak
- PRESS RELEASE: SANS Institute Hails Vorlon as Impressive Solution
- PCI DSS 4.0 and Third-Party Apps in Merchant Business Ecosystems
- Mike Cioffi Joins Vorlon as VP of Customers
- UK Ministry of Defence: “Third-Parties Are the Weakest Link, Goodbye”
- "I saw the [Dropbox] Sign and it opened up my eyes to continuously monitoring our third-party apps"
- White Papers
- Rapid Response BreachPlaybook - Snowflake
- 2025 Third-Party App Ecosystem Security Best Practices
- Vorlon Third-Party Application Detection and Response (TADR)
- Splitit cuts the time to detect and respond to third-party security incidents by 93%
- SANS First Look: Third-Party API Security with Vorlon
- Vorlon for Healthcare Firms
- Why Third-Party API Risks are the #1 Healthcare Security Concern for 2025
- Navigating The Risks and Rewards of Third-Party Apps
- 10 Questions to Ask About API Activity
- Spin Cycle Security: Rotating Credentials
- Integrations